Telemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?

Telemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?

The Trump administration has relaxed privacy requirements for telemedicine, or virtual doctor visits: medical staff treating patients over the phone and using video apps such as FaceTime, Zoom, Skype and Google Hangouts. The move raises the chances that hackers will be...
Read More
Are Hackers Targeting Your Association? Here’s How to Stop Them.

Are Hackers Targeting Your Association? Here’s How to Stop Them.

Are hackers targeting your association? The recent revelation that Chinese hackers penetrated the internal computer network of the National Association of Manufacturers (NAM) last summer should be a clarion call to all associations: They are coming for you.  The suspected...
Read More
Democracy @ Stake: 2020 Election Interference DejaVu

Democracy @ Stake: 2020 Election Interference DejaVu

What you need to know about Russia's 2020 election interference Last week, the director of national Intelligence (DNI), a Republican appointee, notified the House Intelligence Committee that Russia is indisputably tampering with the 2020 election similar to election interference in...
Read More
Private Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy

Private Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy

What it is the Surveillance Economy How do you feel about the fact that Facebook knows your weight, your height, your blood pressure, the dates of your menstrual cycle, when you have sex and maybe even whether you got pregnant?...
Read More
Small Business Cybersecurity: 5 Steps to Stop Cybercrime 

Small Business Cybersecurity: 5 Steps to Stop Cybercrime 

Small Business Cybersecurity Gone Terribly Wrong  On August 12, 2003, as I was just sitting down to a tea party with my daughters and their stuffed animals, the doorbell rang. Standing there when I opened the door was a special...
Read More
Data Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info

Data Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info

You're rushed to the hospital after a serious car accident. Doing her job, the admitting physician verifies your blood type prior to giving you a life-saving transfusion. But no one knows the hospital’s medical records have been hacked — but...
Read More
The Unlikely Weapon in Cybersecurity: Going Analog

The Unlikely Weapon in Cybersecurity: Going Analog

Rule #1: Technology is highly unpredictable when it's new & untested. And even worse when it's insecure. All of us have learned not to count on Technology Version 1.0 in mission critical situations. But it seems that Iowa and Pennsylvania didn't get...
Read More
Top Cybersecurity Trends 2020 & the Perils of Prediction

Top Cybersecurity Trends 2020 & the Perils of Prediction

(i.e., Cybercriminals read the same articles as cybersecurity experts) Oh how we love to predict the future. Who will win the next Super Bowl, Presidential Election, or Best in Show Pooch-a-thon following the Macy’s Day Parade? I’m frequently asked as...
Read More
Google Buys Fitbit

Google Buys Fitbit

Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit You’re heading to the gym for a workout when you decide to surprise your coworkers with a treat. You search for the nearest bagel shop on your Google Maps app,...
Read More
Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit

Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit

Spinning Wildly on the Hampster Wheel of the Surveillance Economy You’re heading to the gym for a workout when you decide to surprise your coworkers with a treat. You search for the nearest bagel shop on your Google Maps app....
Read More
Load More